Open source

Cloud Native Buildpacks reach the beta stage

Dockerfile alternative aims to provide an easier way for developers to turn source code into Docker containers

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

Ola CISO Mohd Shadab Siddiqui quits

Mohd Shadab Siddiqui was the head of information security, fraud, risk and compliance at Ola (ANI Technologies).

Critical Magento SQL injection flaw could be targeted by hackers soon

Popular e-commerce platform Magento has released security patches to fix the flaw. Researchers say update now.

The need of the hour is not just AI, but explainable AI: Subram Natarajan, CTO, IBM India/South Asia

From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead. 

Cyber and physical convergence creates new attack opportunities for cybercriminals

Access to these devices could enable cybercriminals to snoop on private interactions, enact malicious onsite activities, or gain an entry point into cyber systems.

IoT botnets target enterprise video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path.

CISO movements, new appointments and exits at India's top enterprise IT companies

CSO Online brings to you the comprehensive list of CISO/CSO movements and new appointments in the cybersecurity space.

Partner Content
Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. And it is here to stay. 

Technical debt can slow IT to a crawl: Dr. Bill Curtis, Cast Software

Businesses today are facing extremely expensive glitches owing to accumulated technical debt across global IT systems, says Dr. Bill Curtis, Chief Scientist at Cast Software and Director of the Consortium for IT Software Quality (CISQ).

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.